Академический Документы
Профессиональный Документы
Культура Документы
Computer Skill
Part 2
Dr monther Tarawneh
! Have you ever managed you emails using a
program?
! How do you arrange many windows on disktop?
! What is the best search engine?
! Do purchase a software, rent, or pay per use ony?
! Do you store your files locally or on the net?
! What are the features your best anti-virus program?
Working with Windows
! To make a window fill the entire screen, click its Maximize button or double-click the window's
title bar.
! To return a maximized window to its former size, click its Restore button (this appears in place
of the Maximize button). Or, double-click the window's title bar.
Dealing with windows
! Minimizing (Hiding) a window ( )
! Click itsMinimizebutton.
! The window disappears from the desktop and is visible only as a button on the taskbar.
! To make it visible again, click on its button on the taskbar
! Closing a window
! Closing a window removes it from the desktop and taskbar.
! To close a window, click itsClosebutton
! Aero is a visual desktop experience that combines
translucent windows, appealing color, and graphics
effects with convenient functionality.
! Aeroincludes:
! Snap
! Peek
! Shake
! Flip.
Snap
! Snapallows you to resize open
windows to make reviewing
and comparing easier.
..
()
Peek:
()
Shake
)
(
! When your desktop is cluttered with open windows, you can
useShaketo select a single window and close the rest.
1. Click on the top of the window you want to focus on and
shake your mouse, and the rest of the windows will disappear.
2. Simply shake the window again, and the closed windows will
reappear.
Flip
1. Press and hold the Alt key,
then press Tab to open the
Flip view of your open
windows.
2. Stop on the window you
want to open, and it will
appear on the full screen.
( tap Alt )
()
windows key
Try out
! Making money: People can make money online by many factual ways.
There are lots of options available. Designing, Freelancing, consultancies,
software providers, application always help people to work in an easier way.
! Marketing: There are lots of social media enthusiasts who promote others
product online via various social media sites. There are lots of publishers
available who promote others product by advertising on various websites
blogs etc.
! Online education: Various websites such as the university
Blackboard and Free Video Lectures offer online courses to learn various
things like designing, programming, engineering, medical, finance and other
subjects.
Internet keywords
! Protocol: In general protocol means a system of rules.
! The most common protocols used on the internet are TCP/IP (Transmission
Control Protocol/Internet Protocol )which define how to send and receive
data and how to select the route of the data packet during their way from
computer to another on the internet. Before sending files, the information is
broken down into smaller pieces, called packets
. TCP/IP
! Other protocols like SMTP, FTP, UDP, POP, and HTTP also used.
^
Internet keywords
! HTTP (HyperText Transfer Protocol): HTTP
(Hypertext Transfer Protocol) is the set of rules for
transferring files (text, graphic images, sound, video,
and other multimedia files) on theWorld Wide Web
! A network request / respond protocol used on the www to
retrieve HTML documents.
! HTTP defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take in
response to various commands.( e.g. when we click a
hyperlink on a webpage. )
. HTTP
:
Cont.
! Internet Protocol (IP) Address:
This is a 32-bit number which consists of 4 parts separated by dots and usually
written in the form: 125.110.158.10.
( Each of the decimal numbers represents a string of eight binary digits. Thus,
the above IP address really is a string of 0s and 1s:
10000010.00000101.00000101.00011001
! Each computer or device connected to the internet is given a unique address
known as the INTERNET PROTOCOL ADDRESS (IP address).
! A home computer is given a unique IP address (assigned by the ISP) when it
connects to the internet.
! It is not a permanent number. Every time a different IP address is assigned to
the device when it is connected to the internet.
! The only IP addresses that remain unchanged are the web servers. (e.g. mail
servers like yahoo, Gmail, Google etc.)
! An IP address can be used instead of typing in the full URL(like
www.google.com).
! For example: http://125.110.158.10 would take you straight to the server
corresponding to this address
, IP
.
..
But, the web serves like google, yahoo, gmail IP Address
the IP number is permanent.
MAC Address
IP Address
Cont.
! The web browser reads the HTML symbols or tags and use them to determine
how to display the page.
! There are many web browsers available today such as Explorer, Safari,
Chrome, Opera, and Firefox.
HTML
WWW
! The World Wide Web: Known as the Web, it is a global interactive system
that lets you access information on the Internet. It is a way of accessing
information over the internet using web-browsers.
! People often use the term Web to refer to the Internet, but they are not
exactly the same thing. The Internet is the underlying network of
computers and the WWW is the system which uses the Internet to access
the information. (WWW)
WWW
! Website: A location on the World Wide Web (and Internet) that contains
information about a specific topic. A website usually contains multiple pages
with different types of information about the topic.
Con.
! Home Page: The first page you see when you open a website,. It is usually
gives information about the site and provide hyperlinks to other pages on the
site.
..
! Domains divided the web sites into categories based on their natures or
provided services. Common domains are:
Domains
3. .edu = educational institution
4. .gov = government agency
5. .mil = military agency
6. .net = another ending for a commercial website
Url Anatomy URL
Internet Explorer Pre-installed:
! Internet Explorer is a web browser from Microsoft
! Internet Explorer comes pre-installed, so you won't have to do anything to install it
! To open Internet Explorer:
From the desktop, locate and select the Internet Explorer icon on the taskbar.
You can access it from the Start menu.
! Internet Explorer makes browsing the Web easy and there are Common Toolbar
Buttons in all internet Browsers:
! Step 2: On the Adress bar write http://www.google.com this will take your to the google web site.
! Step 3: In the search box, enter your search keywords for example "google istant". You will get
suggestions based on your keywords and the actual results will begin to display on your page.
Cont.
! Use quotes:
! Putting your search in a quotes tells the search engine to search for documents
that contain that phrase exactly as you type, while without quotes it will search
for the documents which contain that phrase with any order of its words. for
example:
How to pray correctly
CONT.
OR AND NOT
! Booleans and parenthesis:
! By default, if you search for several words, most search engines will
show results where both or all of the words are found.
! This is known as an AND search as though you wanted this and this.
! if you want results with either (or any) of your words, use the OR
keyword. It means that either (or any) of your search terms were found.
For example:
pray OR worship
This will find pages containing either the word pray or worship. Some
page results will contain both.
! When you place search terms in a set of parenthesis, they are treated as a
single unit. So
(pray OR worship) (Alawadi Alghamisi)
This will find pages containing either the word pray or the worship,
and also the name of either "Alawadi" or "Alghamisi".
Cont.
! Exclude Words:
! Let's say you want to search for content about Quran, but you want to
exclude any results that contain the term AlAfasi.
! To do this, simply use the minus sign (-) in front of the word you want to exclude
(or NOT) NOT ( -)
Quran -AlAfasi
! Searching in a specific sites:
! Search about something in a certain website.
! For example, if you want to search for assessment in Dammam
University website you can use the following syntax:
Assessment site:uod.edu.sa
This will search for all content about assessment, but only on uod.edu.sa.
All other search results will be removed.
Try out
.
What is cloud computing?
clouds NIST
! National Institute of Standards and Technology (NIST) defines the cloud computing
as:
"Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool(group) of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider interaction".
(rapidly provisioned : quickly provided)
the resources of clouds are easy to use
and provided to users according to their demands.
and they are provided very quickly.
The resources include networks, servers and storage.
. clouds
! This cloud model composed of five essential characteristics,
three service models, and four deployment models
clouds
Every user is provided with the resources according to his demand.
.
..
2.
wide
()
2. Broad network access. Capabilities are available over the network and
accessed through standard mechanisms that promote use by
heterogeneous thin or thick client platforms (e.g., mobile phones,
laptops, and PDAs (personal digital assistant: a small handheld PC)).
Clouds applications are accessible through different type of devices
(e.g mobile phones, laptops)
clouds
( ):
..
Cloud providers:
collecting 3. cloud
() : google apps
3. Resource pooling. The providers computing resources are
pooled to serve multiple consumers using a multi-tenant model,
with different physical and virtual resources dynamically
assigned and reassigned according to consumer demand. There
is a sense of location independence in that the customer
generally has no control or knowledge over the exact location
of the provided resources but may be able to specify location at
a higher level of abstraction (e.g., country, state, or datacenter).
Examples of resources include storage, processing, memory,
network bandwidth, and virtual machines.
The resources of cloud provider are grouped together
so that multiple users can use them on the same time according to their needs.
could provider
.
.
..
3.
4. Rapid elasticity. (ability to add or remove capacity e.g. processing and memory)
Capabilities can be rapidly and elastically provisioned, in some cases automatically, to
quickly scale out and rapidly released to quickly scale in. To the consumer, the
capabilities available for provisioning often appear to be unlimited and can be purchased
in any quantity at any time.
(capabilities can be stretched out according to the needs and released back when not
required)
.
..
5.
5. Measured Service. This is a reference to services where the cloud provider measures or
monitors the provision of services for various reasons, including billing, effective use of
resources, or overall predictive planning.
Cloud systems automatically control and optimize resource (make the best use of resource) use
by leveraging( use something to maximum advantage ) a metering capability at some level of
abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active
user accounts). Resource usage can be monitored, controlled, and reported providing
transparency for both the provider and consumer of the utilized service.
Cloud system is controlling and measuring the use of resources,
so that the resources can be fully utilized,
and their performance can be improved.
cloud
.
Clouds Service Models
! Cloud Software as a Service (SaaS)
! Cloud Platform as a Service (PaaS)
! Cloud Infrastructure as a Service (IaaS)
.
)(levels of security
Cont.
organizations:
! Private cloud:
! Infrastructure operated solely for an organization. It may be managed by the organization or a
third party and hosted either internally or externally.
. ) (
! Private clouds offer a consumer support and deliver on demand IT resources. It also provides a
high level of security to meet their consumers need.
.
! Public cloud:
! Infrastructure made available to the general public and offers access to cloud services (over
public network.)
! Architecture of public and private clouds almost the same, however, security may be
substantially different for public to private clouds.
( )
( )
! Generally, public cloud service providers like Amazon Web Services (AWS), Microsoft and
Google own and operate the infrastructure at their data center and access is generally via the
Internet.
:(public cloud servies provider)
Amazon Web Servies(AWS) Microsoft, Google
! AWS and Microsoft also offer direct connect services called "AWS Direct Connect" and "Azure
ExpressRoute" respectively, such connections require customers to purchase or lease a private
connection to a peering point offered by the cloud provider
Example of Azure ExpressRoute
WAN WAN
. ) (
.
AWS direct connect
! Hybrid cloud:
! Infrastructure that uses a private cloud organization with integration and use of public cloud
services.
( )
! Most companies use public clouds to Scale up or down quickly and easily to meet demand,
they keep their important applications and sensitive data on private cloud while use public
cloud resources for IaaS.
.
Email system o using outlook
! Microsoft Outlook is an extremely popular e-mail program
! We will learn:
How to Set up email Account
Compose & send emails
Format email
Attach a file to an email
Unread email view
Reply to an email
Search inbox
Create new mail folder
quiz
! Which of the following can you do online? Check all that apply.
! Use social networking platforms
! Use search engines to find information
! Watchmovies and TV shows
! Pay bills and manage bank accounts
! Send and receive email and instant messages
! rue or False: When something is storedin the cloud, it means it's stored on the
Internet instead of your computer's hard drive.
! False
! True
! What is the Internet?
! A global network of computers and electronic devices
! A type of web browser
! A global collection of different websites
! A group of online communication tools, including email and instant messaging
! You can view load multiplewebsites in the same browser window using _____.
! Links
! Windows
! Tabs
! URLs
Set up an email account
1. Start Outlook for the first time.
2. When prompted to set up an email account, select Next.
3. To add an email account, select Yes, and then select Next
4. Enter your name, email address, and password, and then
select Next
5. Wait while Outlook completes the setup.
6. Check the box for Change account settings and click Next.
7. ClickFinish, Outlook will now test your account settings by
trying to send a test message.
Multiple email accounts
! You can add more than one email account and Outlook
will manage all of them for you.
! To add additional email accounts simply:
! SelectFile>Add Account.
! On theAdd Accountpage, enter your name, email address,
and password, and then selectNext.
! SelectFinish.
2. In the Subject box (area labeled 2), type the subject of the
message.
1. On the Message tab, in the Basic Text group (area labeled 5), you can select the
font, font size, font style (bold, italic, and underline), font color, and text
highlighting.
2. On the Format tab, in the Font group, you can select the font and font size;
increase or decrease the size by one increment; change the font style (bold, italic,
underline, strikethrough, subscript, superscript); change the case, the font color,
and the text highlighting; and remove all font formatting.
3. On the Mini toolbar that appears when you select text, you can select the font,
increase or decrease the size by one increment, select a theme, use the Format
Painter, select the font style (bold, italic, and underline), and highlight text.
4. On the Format tab, in the Style group, you can select styles.
Attachment
! To attach any file simply click Attach File and select one of the
options:
Cont.
! To attach an email:
1. Click on Attach Item in the message tab
2. Choose Outlook Item then go to the folder where the
email is, and select the email. You can also choose to attach
the email as text only or as an attachment.
! To attach an electronic business card
An Electronic Business Card is another view of a contact that
displays the contact's information in a highly recognizable form.
To attach an electronic business card:
1. Click on Attach Item in the message tab
2. Select Business Card. You get the option to choose recent
ones that you've attached or Other Business cards.
Unread emails view
1. From yourInbox, selectUnreadabove the email list.
2. The emails that you havent read yet appear in your
email list.
Reply email
1. In the Reading Pane, select Reply, Reply All, or Forward. If
the Reading Pane is off or if youve opened the message in its own
window, on the Home or Message tab, select Reply, Reply All,
or Forward.
! Before we can learn how to protect ourselves, we need to understand what the threats are on
the Internet.
! There are common Internet safety terms that pertain to our computers and identity theft:
2. A virus is a self-replicating program that is designed to infect a computer by
rapidly spreading from one file to another, sometimes causing great harm.
*Worms are similar, except they are usually spread over a network without human help
worms
3. 3. Phishing is mail or instant message scams that are disguised to look like official
communications from a legitimate website. They fool users into providing sensitive
information like passwords, credit card details, etc.
phishing
cont malware
6. hoax is an email chain letter that warns of impending viruses and tries to scare
users into forwarding and continuing the hoax email ( false email)
10. Click jacking is a technique that tricks users into clicking on a malicious link by
adding the link to a transparent layer over what appears to be a legitimate web
page.Users think they are clicking on buttons or links in the legitimate page, when
in reality they are clicking on the concealed links in the hidden page and often
providing access to confidential information in the process.
()
11. Mousetrapping keeps visitors from leaving a website by locking them into a
window, opening multiple windows on the desktop, or relaunching their website in
a window that can't be closed.
Some security suites offer several additional protections, but these are the three main
components you will need.
Tips to keep your computer
healthy ( )
! It is a good practice to turn it off and restart it at least once a week. This gives your computer a chance
to perform regular diagnostic checks and fix minor issues before they become a problem.
! Install software updates:
! When your operating system informs you of a software update, download and install it. Software
updates are designed to fix security vulnerabilities and other bugs in your operating system.
! This will help protect your computer against some of the latest threats.
! Use system restore:
! If you have a download that is causing problems, try your operating system's system restore function.
! This feature allows you to restore your computer to how it was before it began having issues.
! Back up your computer:
! With antivirus protection, your chances of losing your files to damaging malware are greatly reduced.
However, no product offers 100 percent security; therefore, it's a good idea to back up your files on
an external source.
! Windows 7 come with internal backup systems, but this will not help you if your computer
is lost, damaged, or stolen. For externally backing up your files, there are two basic options for home
users: external hard drives and online backup services